Intel Security

View All Publications

Filter Content:

IDC Validation Report: McAfee Integrated Threat Defense Solution

In hands-on lab tests, IDC evaluated McAfee endpoint protection, SIEM, application control, web security, and IPS technologies.

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

Defeat Ransomware: Ensure Your Data Is Not Taken Hostage

Learn how to stop ransomware before it strikes.
Topics: McAfee Labs

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

Ten Ways to Prepare for Incident Response

This Foundstone Services paper focuses on steps and processes that can be taken to help prevent and reduce the malicious impact of commodity malware and viruses on your enterprise, as well as reduce the impact that hackers may have.

User and Entity Behavior Analytics for McAfee Enterprise Security Manager White Paper

This white paper provides an overview of core UEBA capabilities of McAfee Enterprise Security Manager and introduces partners whose products are tightly integrated and fully certified by the Intel Security Innovation Alliance.

Executive Summary: Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Enterprises tend to focus on governance, processes, rules and structure that are slower and less nimble than the market forces that drive attackers. This report examines the differences in approaches and suggests how defenders can take lessons from the black hat community.

Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Enterprises tend to focus on governance, processes, rules and structure that are slower and less nimble than the market forces that drive attackers. This report examines the differences in approaches and suggests how defenders can take lessons from the black hat community.

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

Cybersecurity Maturity = Visibility + Automation

Explore how cybersecurity teams in the sector are achieving more than most with integration and automation